Blockchain and Supply Chain Management

January 24, 2018

Many authors have explored the potential impact of blockchain on supply chain management, and indeed, many articles in the popular press extol the potential of blockchain to impact the supply chain.

Spotlight

Weber Distribution LLC

1961 Weber makes its first high profile acquisition by purchasing 35 additional trucks for its transportation fleet. 1964 The company is acquired by Nick Weber, founder Karl Weber's son, who had been the firm's Vice President and General Manager since 1961. 1967 The corporation name is formally changed to Weber Truck and Warehouse. 1968 Weber acquires A and A Transfer and Storage Inc., of Maywood, California, whose operations had consisted of hauling store fixtures from Los Angeles throughout California and to Arizona, Nevada, and new Mexico. Weber operated its family business from its original location for over 40 years before relocating south of Los Angeles and starting on an expansion that, for the first time, brought Weber national recognition as the premier West Coast logistics provider. 1969 Weber Truck and Warehouse moves to a new 76,000 square foot warehouse in Vernon, California, the Industrial Center of Los Angeles, to establish corporate and operational headquarters. 1970 Ex

OTHER WHITEPAPERS
news image

Supply and withstand: The case for Supply Chain Intelligence

whitePaper | November 28, 2022

The global supply chain is in a constant state of flux. It requires intelligent, resilient and sustainable solutions to meet demand, no matter how quickly or dramatically it changes.

Read More
news image

Technology Expense Management Hyperautomation

whitePaper | January 12, 2023

The value of automation across internal, supply chain, and customer workstreams is also well accepted. Automation improves productivity, reduces cost, and increases margin. Artificial intelligence (AI), augmented reality (AR), robotic process automation (RPA), and machine learning (ML) are examples of technology used throughout business to transform workflows and business experiences.

Read More
news image

Securing the Software Supply Chain: Recommended Practices Guide for Developers

whitePaper | August 22, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers.

Read More
news image

Key strategies for successful transportation transformations

whitePaper | November 16, 2022

“Transformational initiatives are truly driven by business needs and technology is an enabler.” This should be the “core” philosophy of any organization taking a step toward transformation. Through this white paper, we will discuss supply chain transformation for transportation operations. Organizations look toward transformational changes when they see significant impact (both cost and longevity) to their future business models, either due to disruptions in the changing world or technologies becoming obsolete

Read More
news image

Scudo: A Proposal for Resolving Software Supply Chain Insecurities in Vehicles

whitePaper | July 15, 2022

For many years supply chain security appears to have been something of a second-tier priority for both software developers and the companies that rely upon their product. It was more common to focus attention on what happens after the software is built, through code reviews, penetration testing, and the development and implementation of patches and updates. This type of approach overlooks the very real possibility that, even with all the efforts mentioned above, end users still have no guarantee they are actually installing the application originally conceived as a code base. Over time, this somewhat myopic vision has given malicious actors multiple opportunities to insert malware or damage images. But, recent events have rapidly forced the industry to take a wider perspective on how software security is defined.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 15, 2022

Zero Trust is a proactive, integrated approach to security across all layers of the digital estate. It explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to threats. Zero Trust is imperative for business, technology, and security teams working to protect everything as it is, and as it could be. It is an ongoing journey for security professionals, but getting started begins with simple first steps, a continuing sense of urgency, and continuous iterative improvements.

Read More

Spotlight

Weber Distribution LLC

1961 Weber makes its first high profile acquisition by purchasing 35 additional trucks for its transportation fleet. 1964 The company is acquired by Nick Weber, founder Karl Weber's son, who had been the firm's Vice President and General Manager since 1961. 1967 The corporation name is formally changed to Weber Truck and Warehouse. 1968 Weber acquires A and A Transfer and Storage Inc., of Maywood, California, whose operations had consisted of hauling store fixtures from Los Angeles throughout California and to Arizona, Nevada, and new Mexico. Weber operated its family business from its original location for over 40 years before relocating south of Los Angeles and starting on an expansion that, for the first time, brought Weber national recognition as the premier West Coast logistics provider. 1969 Weber Truck and Warehouse moves to a new 76,000 square foot warehouse in Vernon, California, the Industrial Center of Los Angeles, to establish corporate and operational headquarters. 1970 Ex

Events